2017
DOI: 10.5120/ijca2017914332
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Key based LSB Technique for Steganography

Abstract: Steganography refers to the branch of computer science which deals with the covering up message in the format which cannot be detectable by any intruder. The secret message or the confidential data can be sent over internet with security using various steganography techniques. This technique has overcome many drawbacks of traditional method of cryptography in which data is encoded and sent over the internet which can be seen by the intruders and they can make attack on it. It is possible for the intruder to ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…To calculate Peak Signal to Noise Ratio (PSNR) [18,19] we have to first calculate Mean Square Error (MSE) [20] between the cover image and the stego image. Given a noise-free m×n monochrome image I [21] and its noisy approximation K, MSE is defined as:…”
Section: Resultsmentioning
confidence: 99%
“…To calculate Peak Signal to Noise Ratio (PSNR) [18,19] we have to first calculate Mean Square Error (MSE) [20] between the cover image and the stego image. Given a noise-free m×n monochrome image I [21] and its noisy approximation K, MSE is defined as:…”
Section: Resultsmentioning
confidence: 99%
“…The proposed algorithm was applied to a set of images of different sizes,the proposed algorithm was applied to a set of images of different sizes where a 100-character text massage was hidden, and the results obtained were as shown in table (2), which illustrates the use of the algorithm in detail where adopted to take pictures of different sizes and standards were applied to measure the quality of concealment and data retrieval efficiency was measured as the peak signal to noise ratio and error rate in a serrect message after hiding.…”
Section: Resultsmentioning
confidence: 99%
“…In encryption technique, the content of the confidential message is changed in such a way as to ensure that no third party can read the confidential message correctly. In the technique of hiding information, the confidential message is hidden in such a way as to ensure that no third party can detect the existence of the confidential message itself which considers integrated technical concealment technology for encryption technology [1] [2] Biometrics is one of the fastest growing branches of information security technology. Biometrics can be defined as automatic methods and means of identification the identity or recognize it based on the biological and behavioral characteristics of the individual.…”
Section: Introductionmentioning
confidence: 99%